rary> IT 145: Intro to Software Development home > 3.13: String comparisons CHALLENGE 3.13.2: Print two strings in alphabetical order. ACTIVITY Print the two strings, firstString and secondString, in alphabetical order. Assume the strings are lowercase. End with newline. Sample output capes rabbits Code writing challenge activity demo 1 import java.util.Scanner; 2 3 public class OrderStrings { 4 5 67891012345 15) Run public static void main (String [] args) { Scanner scnr = new Scanner(System.in); } String firstString; String secondString; firstString =scnr.next(); secondString = scnr.next(); *Your solution goes here EzyBooks catalog View your last submission ✓
Q: By doing research on the Internet, you may learn about the most recent advancements in wireless…
A: A wireless LAN (WLAN) creates a local area network by wirelessly connecting two or more devices in a…
Q: Explain the software configuration management process by differentiating between baseline version…
A: Introduction The process of managing and regulating changes to the software throughout its lifecycle…
Q: If that's the case, how up to date are you on the most recent security protocols for networks? I…
A: Introduction: In today's digital age, network security is of utmost importance. With the increasing…
Q: How would you briefly define software project management?
A: Brief definition software project management The process of organizing, directing, and controlling…
Q: Please written by computer source Using C++, use a linked list to create an alphabetical Contact…
A: In this question we have to code in C++ for the implementation of the LinkedList and PersonNode…
Q: Can MDM be implemented in the database using a number of different strategies?
A: Answer Explanation Business can improve their data security with mobile device management (MDM),a…
Q: Using a modern-day health band, this M2M illustration demonstrates the benefits of a loT-based…
A: M2M (Machine-to-Machine) and IoT (Internet of Things) are related concepts, but they are not exactly…
Q: What methods were utilized to dissect the usability and UX benchmarks into their component parts?
A: Usability concerns "the effectiveness, efficiency, and satisfaction with which specific users…
Q: What are the many different kinds of architecture used in software engineering?
A: There are five architectures: 1) Client-Server 2) Event-Driven 3) Layered 4) Microkernel 5)…
Q: What are the differences of a use case and a scenario? Explain this using an example that we have…
A: What are the differences of a use case and a scenario? Explain this using an example that we have…
Q: What exactly is technology from a managerial point of view?
A: Introduction: When it comes to making day-to-day choices and determining overall corporate strategy,…
Q: If that's the case, how up to date are you on the most recent security protocols for networks? I…
A: Introduction: Latest network security protocols are below. Explanation: Firewall: Routers and…
Q: Is it possible to create a list of some of the most significant elements that play a role in the…
A: Introduction: to determine some of the essential elements that result in efficient cyber defence.…
Q: What are some practical next measures we may take in light of what we know about the DoS attack that…
A: In light of the recent Distributed Denial of Service (DDoS) attack against iPremier, it is crucial…
Q: Discover wireless LAN types.
A: Answer:
Q: What exactly is meant by the term "network topology"? It is necessary to be able to recognise and…
A: Introduction: The topology of a network is defined by the physical or logical arrangement of nodes…
Q: If we wish to understand how artificial neural networks function, we must first define what we mean…
A: Question: If we wish to understand how artificial neural networks function,we must first define what…
Q: Educators at all levels should focus on at least three areas of Ed Tech.
A: The quality of education has a direct bearing on the student experience, and there are several…
Q: When these three conditions are met, and only then, can a network be considered effective and…
A: According to the findings of the research network, it has been shown that when the capacity is used…
Q: What does a day in the life of a software developer look like? Which three different types of…
A: A day in the life of a software developer entails tackling complex coding challenges, collaborating…
Q: It's important to divide software project management from the rest of the project. Explain in a few…
A: INTRODUCTION: Here, we must distinguish between project, project management, and software project…
Q: What is the theoretical underpinning of the idea of cybercrime? Provide citations in your answer for…
A: The theoretical underpinning of the idea of cybercrime can be traced to various criminological…
Q: What kind of shifts can we expect to see brought about by the combination of Al and machine learning…
A: AI and machine learning are cutting-edge technologies that alter the system design and analysis…
Q: What are the best practises that should be followed in order to ensure that a local area network…
A: To make sure that your local area network (LAN) is dependable and always available, there are some…
Q: It would be helpful if you could provide an overview of some of the most important challenges with…
A: We have to explain some of the most important challenges with network security.
Q: Is there a Conceptual Framework for Cybercrime anywhere in the world? In your response, please…
A: Answer: Introduction Understanding cybercrime from a conceptual framework for the cybercrime…
Q: To what end does the internet serve people with disabilities, and how may this be made easier? What…
A: The internet has the potential to serve people with disabilities in numerous ways. For example, it…
Q: Organizations should consider the pros and cons of deploying solutions tailored to their industry in…
A: 1) Investing in IT can provide significant benefits for organizations, but it is important to…
Q: What is the best way to respond to a denial of service assault in light of the recent cyber security…
A: Introduction: Denial of Service -DoS attacks are on the increase, presenting grave dangers to cyber…
Q: plemented in C++ would have the same tion? Then
A: Introduction: Is it reasonable to expect that a circularly linked list solution for queues…
Q: As compared to deep learning, where does machine learning stand?
A: Machine learning The objective of machine learning, which is a subsidiary of artificial intelligence…
Q: What are some of the criticisms that might be leveled against the idea of using a single programming…
A: Programming languages are an essential component of modern technology and software development,…
Q: Find out how much it will cost to set up a wireless local area network (LAN) via the internet, and…
A: Cost to set up a wireless local area network (LAN) via the internet 1) The cost of setting up a…
Q: What is the best way to respond to a denial of service assault in light of the recent cyber security…
A: Denial of Service (DoS) is a type of cyber attack in which an attacker tries to prevent legitimate…
Q: Which of the following is true about the bind() function? Question 11 options: It is used to…
A: In this question we have to answer Which of the following is true about the bind() function? Let's…
Q: The height and speed of a projectile launched with a speed of vo at an angle A to the horizontal are…
A: Matlab:- Implement of algorithms easily. Easily Debug Use a large database Process images Symbolic…
Q: What are the key TCP/IP vs. OSI differences? Define it in detail.
A: What are the key TCP/IP vs. OSI differences? Define it in detail answer in below step.
Q: The usage of models like as OSI and TCP/IP may make it easier to comprehend and communicate on…
A: Sure, I have used the TCP/IP Protocol. TCP is extensively used by several Internet applications,…
Q: The similarities and differences between neural networks and learning systems, in addition to…
A: Here is your solution -
Q: Why is it more harder to recover data in a database environment?
A: In a database environment, data recovery can be a complex and challenging process. One major reason…
Q: When someone refers to "deep learning," what precisely do they mean by that phrase?
A: Question: When someone refers to "deep learning" what precisely do they mean by that phrase? Answer:…
Q: The subject of how to counter a distributed denial of service (DDoS) using the strategy that will be…
A: Yes, countering a Distributed Denial of Service (DDoS) attack is a critical topic in cybersecurity.…
Q: Technology is essential to our existence, but how can we reconcile this need with the challenges and…
A: Technology has many opportunities and problems. There are many ways to learn interesting skills and…
Q: The Problem: You are coding a graphics filter that process each of an image through a filter. Each…
A: Like floating point, fixed point arithmetic enables calculations using real values. The decimal…
Q: Students may potentially learn about artificial intelligence via the usage of virtual reality.
A: In recent years, efforts have been made to develop AI algorithms to behave more humanlike, such as…
Q: What distinguishes software engineering from other sub-disciplines of engineering, and how does it…
A: Introduction The design, development, and maintenance of software systems are the primary concerns…
Q: Why is it harder to recover data in a database environment?
A: Recovering data in a database environment can be more challenging than in other environments.
Q: There is a potential that the OSI model and the TCP/IP model will be able to help us understand and…
A: The answer is given below step.
Q: The use of wireless networking may be advantageous in certain situations but also problematic in…
A: Wireless networking is only permitted to be utilised as a supplementary transmission source in the…
Q: What are the many different kinds of architecture used in software engineering?
A: Introduction: Software engineering is something that is of designing, creating, testing, and…
Trending now
This is a popular solution!
Step by step
Solved in 4 steps with 3 images
- #include <stdio.h>#include <stdlib.h>#include <unistd.h>#include <sys/types.h>#include <sys/wait.h> int main(){ int i, s; int a[] = {23,4,8,33,25,7,12,6,49,50,11,20,21,24,35}; pid_t pid; pid = fork(); if (pid == 0) { printf("I'm a child, I'll be printing the even numbers:\n"); for(i=0;i<(sizeof(a)/sizeof(int));i++) if(a[i]%2 == 0) printf("%d ",a[i]); } else { printf("I'm the parent, I'll be printing the odd numbers:\n"); if (pid > 0) pid = waitpid(pid, &s, 0); for(i=0;i<(sizeof(a)/sizeof(int));i++) if(a[i]%2 != 0) printf("%d ",a[i]); } return 0;} the output seem to have some error whereby it cannot output the number for the first ifAssume there is no compiling or linking error. Review the followingpieces of code and briefly explain potential issues. A. std::string &get_hello() {std::string s = "hello";return s;}B. class time {int hour, min, sec;public:bool set(int h, int m, int s);int get_hour() const;int get_min() const;int get_sec() const;};C. class collection {};class my_array : public collection {std::vector<int> vec_;};void test() {collection *p = new my_array;delete p;}in c++ 1. Write a function that takes a 1 Dimensional array and an integer n andreturns the number of times ‘n’ appears in the array. If ‘n’ does not appearin the array, return -1.2. Write a function that takes a 2 Dimensional array and returns the positionof the first row with an odd sum. Assume that the column size is fixed at 4.If no sum is odd, return -13. Write a class, “pie”, that has a number of slices (int slices) as a privateproperty. Construct the pie with a number of slices and remove a slice witha function. Tell the user how many slices are in the pie.
- **11.18** Java Solve (ArrayList of Character) Using the following header, create a method that produces an array list of characters from a string: toCharacterArray public static ArrayListCharacter> (String s) ToCharacterArray("abc"), for example, returns an array list containing the characters 'a', 'b', and 'c'.c++ The Lock class of the preceding problem has a small problem. It does not support combinations that start with one or more zeroes. For example, a combination of 0042 can be opened by entering just 42. Solve this problem by choosing a different representation. Instead of an integer, use a string to hold the input. Once again, the combination is hardwired. You will see in Section 9.6 how to change it. Complete the following file:This is the code so far #include <iostream> // for cin and cout#include <iomanip> // for setw() and setfill()using namespace std; // so that we don't need to preface every cin and cout with std:: void printSpaces(int n, int end){for (int j = n; j > end; j--){cout << " ";}}void printFirstTwoBuildingSection(int n, int startSpacing){int start = 2 * ((n / 2) - 1), end = 0;for (int i = 0; i < n; i++){printSpaces(startSpacing, 0);cout << "|";if (i < (n / 2)){printSpaces(i, 0);cout << "\\";printSpaces(start, 0);cout << "/";start -= (2);printSpaces(i, 0);cout << "|" << endl;}else{printSpaces(n - i - 1, 0);cout << "/";printSpaces(end, 0);cout << "\\";end += (2);printSpaces(n - i - 1, 0);cout << "|" << endl;}}printSpaces(startSpacing, 0);cout << "/";for (int i = 0; i < n; i++){cout << "-";}cout << "\\" << endl;}int main(){int menuOption = 0; cout << "Choose from among the following…
- c++ Modify the following so that it uses smart pointers instead of raw pointers. // This program illustrates the use of constructors// and destructors in the allocation and deallocation of memory.#include <iostream>#include <string>using namespace std; class Squares{private:int length; // How long is the sequenceint *sq; // Dynamically allocated arraypublic:// Constructor allocates storage for sequence// of squares and creates the sequenceSquares(int len){length = len;sq = new int[length];for (int k = 0; k < length; k++){sq[k] = (k+1)*(k+1);}// Tracecout << "Construct an object of size " << length << endl;}// Print the sequencevoid print(){for (int k = 0; k < length; k++)cout << sq[k] << " ";cout << endl;}// Destructor deallocates storage~Squares(){delete [ ] sq;// Tracecout << "Destroy object of size " << length << endl;}}; //***********************************************// Outputs the sequence of squares in a…6.44 LAB: Contact list (JAVA) A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program in java that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Assume that the list will always contain less than 20 word pairs. Ex: If the input is: 3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank the output is: 867-5309 Your program must define and call the following method. The return value of getPhoneNumber() is the phone number associated with the specific contact name.public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize) Hint: Use two arrays: One for…5.16 LAB: Adjust list by normalizing (JAVA) When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustment can be done by normalizing to values between 0 and 1, or throwing away outliers. For this java program, adjust the values by dividing all values by the largest value. The input begins with an integer indicating the number of floating-point values that follow. Assume that the list will always contain fewer than 20 floating-point values. Output each floating-point value with two digits after the decimal point, which can be achieved as follows:System.out.printf("%.2f", yourValue); Ex: If the input is: 5 30.0 50.0 10.0 100.0 65.0 the output is: 0.30 0.50 0.10 1.00 0.65 The 5 indicates that there are five floating-point values in the list, namely 30.0, 50.0, 10.0, 100.0, and 65.0. 100.0 is the largest value in the list, so each value is divided by 100.0. For coding simplicity, follow every output value by a…
- 6.29 LAB: Remove all even numbers from an array Use Java programming. Write the removeEvens() method, which receives an array of integers as a parameter and returns a new array of integers containing only the odd numbers from the original array. The main program outputs values of the returned array. Hint: If the original array has even numbers, then the new array will be smaller in length than the original array and should have no blank elements. Ex: If the array passed to the removeEvens() method is [1, 2, 3, 4, 5, 6, 7, 8, 9], then the method returns and the program output is: [1, 3, 5, 7, 9] Ex: If the array passed to the removeEvens() method is [1, 9, 3], then the method returns and the program output is: [1, 9, 3] import java.util.Arrays; public class LabProgram { public static int[] removeEvens(int [] nums) { /* Type your code here */} public static void main(String[] args) { int [] input = {1,2,3,4,5,6,7,8,9};int [] result = removeEvens(input); // Helper method…1. Consider the below code snippet. Assume bool foundPair and int pairCount are both declared and have valid values. if (foundPair) cout << "We have a pair!\n"; pairCount++; True/False: when we run this code, pairCount will only increment if foundPair is true. A) True B) False2. Replace (????) with relevant code for the program to function. Details about the programs are provided below. (Jav has been used). Show the output. a)This program prints four lines: kimarr() 4 [9, 0, 0, 14] 2 [9, 0, 0, 14] kimarr() 8 [9, 9, 14, 14] 4 [9, 9, 14, 14] */ package finalexamtakehome2; import java.util.*; // for Arrays class /** * * @author sweetkim */ public class Finalexamtakehome2 { // public static void kimarr(int x, int[] a) { x = x * 2; if (x > 6) { a[2] = 4; a[1] = 9; } else { a[0] = 9; a[3] = 1; } System.out.println("kimarr() " + x + " " + Arrays.toString(????)); } // public static void main(String[] args) { int x = 1; int[] a = new int[4]; x = x * ????; kimarr(x, a); System.out.println(x + " " + Arrays.toString(????)); x = x * 2; kimarr(x, a); System.out.println(x + " " +…